1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
/*
* TLS Session Management
* (C) 2011 Jack Lloyd
*
* Released under the terms of the Botan license
*/
#include <botan/tls_session_state.h>
#include <botan/der_enc.h>
#include <botan/ber_dec.h>
#include <botan/asn1_str.h>
#include <ctime>
namespace Botan {
TLS_Session_Params::TLS_Session_Params(const MemoryRegion<byte>& session_id,
const MemoryRegion<byte>& master_secret,
Version_Code version,
u16bit ciphersuite,
byte compression_method,
Connection_Side side,
const X509_Certificate* cert,
const std::string& sni_hostname,
const std::string& srp_identity) :
session_start_time(time(0)),
session_id(session_id),
master_secret(master_secret),
version(version),
ciphersuite(ciphersuite),
compression_method(compression_method),
connection_side(side),
sni_hostname(sni_hostname),
srp_identity(srp_identity)
{
if(cert)
peer_certificate = cert->BER_encode();
}
TLS_Session_Params::TLS_Session_Params(const byte ber[], size_t ber_len)
{
BER_Decoder decoder(ber, ber_len);
byte side_code = 0;
ASN1_String sni_hostname_str;
ASN1_String srp_identity_str;
BER_Decoder(ber, ber_len)
.decode_and_check(static_cast<size_t>(TLS_SESSION_PARAM_STRUCT_VERSION),
"Unknown version in session structure")
.decode(session_id, OCTET_STRING)
.decode_integer_type(session_start_time)
.decode_integer_type(version)
.decode_integer_type(ciphersuite)
.decode_integer_type(compression_method)
.decode_integer_type(side_code)
.decode(master_secret, OCTET_STRING)
.decode(peer_certificate, OCTET_STRING)
.decode(sni_hostname_str)
.decode(srp_identity_str);
sni_hostname = sni_hostname_str.value();
srp_identity = srp_identity_str.value();
connection_side = static_cast<Connection_Side>(side_code);
}
SecureVector<byte> TLS_Session_Params::BER_encode() const
{
return DER_Encoder()
.start_cons(SEQUENCE)
.encode(static_cast<size_t>(TLS_SESSION_PARAM_STRUCT_VERSION))
.encode(session_id, OCTET_STRING)
.encode(static_cast<size_t>(session_start_time))
.encode(static_cast<size_t>(version))
.encode(static_cast<size_t>(ciphersuite))
.encode(static_cast<size_t>(compression_method))
.encode(static_cast<size_t>(connection_side))
.encode(master_secret, OCTET_STRING)
.encode(peer_certificate, OCTET_STRING)
.encode(ASN1_String(sni_hostname, UTF8_STRING))
.encode(ASN1_String(srp_identity, UTF8_STRING))
.end_cons()
.get_contents();
}
bool TLS_Session_Manager_In_Memory::find(const MemoryVector<byte>& session_id,
TLS_Session_Params& params,
Connection_Side side)
{
std::map<std::string, TLS_Session_Params>::const_iterator i =
sessions.find(hex_encode(session_id));
if(i != sessions.end() && i->second.connection_side == side)
{
params = i->second;
return true;
}
return false;
}
void TLS_Session_Manager_In_Memory::prohibit_resumption(const MemoryVector<byte>& session_id)
{
std::map<std::string, TLS_Session_Params>::iterator i =
sessions.find(hex_encode(session_id));
if(i != sessions.end())
sessions.erase(i);
}
void TLS_Session_Manager_In_Memory::save(const TLS_Session_Params& session_data)
{
if(max_sessions != 0)
{
while(sessions.size() >= max_sessions)
sessions.erase(sessions.begin());
}
sessions[hex_encode(session_data.session_id)] = session_data;
}
}
|